Cubicle vs. the Coffee Shop Behavioral Modes in (Enterprise) - - PowerPoint PPT Presentation

cubicle vs the coffee shop
SMART_READER_LITE
LIVE PREVIEW

Cubicle vs. the Coffee Shop Behavioral Modes in (Enterprise) - - PowerPoint PPT Presentation

Cubicle vs. the Coffee Shop Behavioral Modes in (Enterprise) End-Users Frederic Giroire Jaideep Chandrashekar Gianluca Iannaccone Dina Papagiannaki Eve Schooler Nina Taft Intel Research/ INRIA Motivation Previous studies of user


slide-1
SLIDE 1

Cubicle vs. the Coffee Shop

Behavioral Modes in (Enterprise) End-Users

Frederic Giroire Jaideep Chandrashekar Gianluca Iannaccone Dina Papagiannaki Eve Schooler Nina Taft Intel Research/ INRIA

slide-2
SLIDE 2

Motivation

  • Previous studies of user profiles used traces

collected “in-network”

  • Corporate networks today have 50-60% mobile

hosts

  • When profile is constructed in one environment,

how different in another?

  • Do profiles computed from “averaging” hold true

in any of the environments?

  • Is there a canonical user profile?
  • What (statistics) change when users move?
  • Should user profiles care about location?
slide-3
SLIDE 3

Data

  • 350+ users, all running Windows XP SP2 custom

build

  • Collection software (windump+custom app) ran
  • n laptops and (few) desktops
  • Unique data-set (most traces collected in

network)

  • Traces collected for ~5 weeks; s/w automatically

deactivated

  • Traces periodically uploaded to central server
slide-4
SLIDE 4

Recruiting users

  • 1400+ people polled from across 3 business units
  • Up front and clear statement about intended use
  • Explicit consent-- software was installed by users
  • Traces are uploaded anonymously; filenames do not

identify individual users

  • At central server: packets processed and payloads

discarded

  • Amazon gift certificates given out as enticement
slide-5
SLIDE 5

Environments

inside

  • utside

vpn

enterprise

  • lots of protections
  • well provisioned
  • complete access to

infrastructure services

  • no protection
  • badly provisioned
  • no access to inf. services
  • limited protection
  • moderately provisioned
  • limited access to inf.

services

slide-6
SLIDE 6

Questions

  • How do users spend their time across

environments

  • Are there very big differences in protocol

activity across the environments

  • What are the differences in how various

network services are used

slide-7
SLIDE 7

A month in the life of a laptop

  • utside

vpn inside

slide-8
SLIDE 8

A month in the life of a laptop

  • utside

vpn inside

slide-9
SLIDE 9

Environment Lifetimes

Deskbound employees? road warriors?

bob carl alice eve

median time of “session” (avg. diff =85%)

slide-10
SLIDE 10
  • How do users spend their time across

environments

  • Are there very big differences in protocol

activity across the environments

  • Differences in how various network

services are used

Questions

slide-11
SLIDE 11

TCP usage (connections)

95th %-ile of connections/15 mins

  • thresh. inside
  • thresh. outside

bob carl alice eve

slide-12
SLIDE 12

Variation creates “exploit gap”

Time ➞

#Connections

at work at home

exploit gap

detector threshold

allow a larger operating region for malicious traffic to go undetected

Current security mechanisms static thresholds ignore location context

slide-13
SLIDE 13

Variation creates “exploit gap”

Time ➞

#Connections

at work at home

exploit gap

detector threshold

allow a larger operating region for malicious traffic to go undetected

Current security mechanisms static thresholds ignore location context

examples (conns/min) Zapchast (0-20) SDbot C&C (0-50)

slide-14
SLIDE 14
  • How do users spend their time across

environments

  • Are there differences in protocol activity

across the environments

  • Differences in how various network

services are used

Questions

slide-15
SLIDE 15

Network Services (ports)

bob carl alice eve

fraction of connections for web traffic (80,8080,8888)

relatively more http traffic when INSIDE

slide-16
SLIDE 16

Network Services (ports)

fraction of connections for Microsoft traffic

low volume of traffic on these ports when INSIDE

Text

slide-17
SLIDE 17

Network Services (ports)

low volume of traffic on these ports when INSIDE

less popular

m

  • r

e p

  • p

u l a r

Text

a different view-- “popularity” of the protocols

slide-18
SLIDE 18

Conclusions

  • Behavior is drastically different across all the

dimensions studied

  • Profile constructed from averaged behavior not

reflective of any particular environment

  • No canonical user profile: users vary greatly

from each other

  • Security mechanisms need to be location aware

to close “gaps” that can be exploited

slide-19
SLIDE 19

Questions

Jaideep Chandrashekar jaideep.chandrashekar@intel.com